Description
Cross-site scripting (XSS) vulnerability in standard_error_message.dtml for Zwiki after 0.10.0rc1 to 0.36.2 allows remote attackers to inject arbitrary HTML and web script via a malformed URL, which is not properly cleansed when generating an error message.
Exploits (1)
References (6)
Core 6
Core References
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/11745
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=110138568212036&w=2
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=110149122529761&w=2
Various Sources x_refsource_confirm
http://zwiki.org/925ZwikiXSSVulnerability
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/18237
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200412-23.xml
Scores
EPSS
0.0834
EPSS Percentile
92.3%
Details
Status
published
Products (2)
zwiki/zwiki
0.10_rc1
zwiki/zwiki
0.36.2
Published
Jan 10, 2005
Tracked Since
Feb 18, 2026